- eCampus News - https://www.ecampusnews.com -

How to maintain the balance between security and privacy

We’re in a unique moment in history, where the negative consequences of organizations tracking our digital traffic are painfully clear. It’s certainly understandable that “security measures” can seem to many people more like intrusive surveillance than personal protection. But a lack of defenses will also have negative consequences for our safety and feeling of trust.

What can security professionals in higher ed do to maintain the balance between safety and privacy? Is it possible to maintain trust in the institution and yet enable users to explore safely?

The importance of context

Consider security and safety analogies in the physical realm such as security guards or checkpoints. Everyone has his or her own sense of what seems obtrusive and what is welcome. There are questions that can help predict where security measures will fall on the acceptable-to-intrusive continuum:

Generally speaking, public or personal areas are expected to operate with little to no proactive controls. As long as people have access to effective and timely reactive measures, a sense of safety can be maintained. Sensitive areas are expected to be under a certain amount of scrutiny, as long as that scrutiny is applied fairly and transparently.

Context in action

In an educational environment, there are areas that must be publicly accessible and relatively unrestricted and areas that should remain private to the individuals or groups who use that space. There are also areas that should be tightly controlled, such as financial, healthcare and administrative information.

In areas that should be tightly controlled, there are few people who would take issue with closely monitoring activities and restricting users’ ability to perform activities outside those strictly required to do those necessary, sensitive tasks. The opposite extreme would be personal repositories or computers within housing areas of your network, which should have minimal monitoring or restriction. Most other systems, machines, and users fall somewhere in between.

In unrestricted areas, it’s preferable to use a “blacklist” approach that excludes only those users, code, or machines that are predetermined to be dangerous. Logging only detected security events is generally considered tolerable and useful in this context. In restricted areas, you can add a “whitelist” via which you allow only things based on a list of “known good” users, code, or machines. Regulations may mandate the use of logging for audit purposes in these areas.

In a college or university network, the areas that must be strictly controlled should be separate from areas that are expected to operate with little restriction. This separation minimizes the ability of threats or “bad actors” to cause problems by moving from one area to another, raising the level of their access privileges as they go.

Beyond this, we can provide users with tools to protect their own personal areas, as well as education about how and when they might wish to apply them. These tools could include things like:

In general, people aren’t opposed to security, but rather to the loss of personal control it often implies. By understanding the context of the controls, and enabling users to protect their own resources, we can make security measures more palatable.